, Conditions d'évaluation au niveau national
, 93 6.2.2 Sélection du degré de régression polynomiale, p.93
Scénarios de division des mesures, p.95 ,
,
, 100 6.4.1 Division apprentissage/vérification et degré de régression polynomiale
, , p.101
, Estimation des intersections par une méthode de type Monte-Carlo
, Présentation des résultats au niveau mondial . . 105 6.5.1 Fonctions d'estimation
, Aspect méthodologique pour l'utilisation des techniques
111 6.6.2 Effet du nombre de points de repère, p.112 ,
, , p.113
, , p.114
,
The NIST Definition of Cloud Computing ,
Data Storage Management in Cloud Environments : Taxonomy, Survey, and Future Directions, vol.50 ,
Service Level Agreement in Cloud Computing ,
, SLA"), Service Level Agreement
, Missouri tornado destroys hospital data center
Four Lightning Strikes in Belgium Erase Google Customer Data ,
NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say ,
, Available : https
, 4943 -115th Congress, 2017.
, Censorship of Google Sites in China | GreatFire Analyzer
Insight and Perspectives for Content Delivery Networks, vol.49, pp.101-106 ,
, The Digital Universe Driving Data Growth in Healthcare
,
, Code de la santé publique -Article L1111-8
, Décret n°2018-137 du 26 février 2018 relatif à l'hébergement de données de santé à caractère personnel
, 27 avril 2016 relatif à la protection des personnes physiques à l'égard du traitement des données à caractère personnel et à la libre circulation de ces données, et abrogeant la directive 95/46/ce (règlement général sur la protection des données) (texte présentant de l'intérêt pour l'eee), 2012.
,
, on Amending Some Legislative Acts of the Russian Federation in as Much as It Concerns Updating the Procedure for Personal Data Processing in Information-Telecommunication Networks (with Amendments and Additions, 2014.
, Notice of the People's Bank of China on Urging Banking Financial Institutions to Do a Good Job in Protecting Personal Financial Information
, Provisions on Protecting the Personal Information of Telecommunications and Internet Users
,
, Law of the People's Republic of China on Guarding State Secrets
, TPM 2.0 Library Specification
, TPM 1.2 Main Specification
Using Trusted Platform Modules for Location Assurance in Cloud Networking," in Network and System Security, ser. Lecture Notes in Computer Science, pp.109-121 ,
GeoProof : Proofs of Geographic Location for Cloud Computing Environment, Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference On, pp.506-514 ,
Remote data checking using provable data possession, vol.14, p.12 ,
Trusted Geolocation-Aware Data Placement in Infrastructure Clouds, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp.352-360 ,
Policy-sealed Data : A New Abstraction for Building Trusted Cloud Services, Proceedings of the 21st USENIX Conference on Security Symposium, ser. Security'12. USENIX Association, pp.10-10 ,
Addressing Data and User Mobility Challenges in the Cloud, 2013 IEEE Sixth International Conference on Cloud Computing, pp.549-556 ,
Privacy Control in Cloud VM File Systems, Cloud Computing Technology and Science (CloudCom), vol.2, pp.276-280, 2013. ,
Compliance-Preserving Cloud Storage Federation Based on Data-Driven Usage Control, Cloud Computing Technology and Science (CloudCom), vol.2, pp.285-288, 2013. ,
A Monitoring and Audit Logging Architecture for Data Location Compliance in Federated Cloud Infrastructures, Parallel and Distributed Processing Workshops and Phd Forum, pp.1510-1517 ,
On the Requirements for Successful GPS Spoofing Attacks, Proceedings of the 18th ACM Conference on Computer and Communications Security, ser. CCS '11. ACM, pp.75-86 ,
Design of security enhanced TPM chip against invasive physical attacks, 2012 IEEE International Symposium on Circuits and Systems, pp.1787-1790 ,
, TPM Vulnerabilities to Power Analysis and An Exposed Exploit to Bitlocker
Vulnerability of RSA Algorithm, pp.74-78 ,
Landmark-based data location verification in the cloud : Review of approaches and challenges, vol.6, p.31 ,
, On the Vulnerabilities of Landmark-Based Data Location Approaches : Threats, Solutions, and Challenges, 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), pp.127-134
Enhanced learning classifier to locate data in cloud data centres, vol.4, p.141 ,
Verification of Data Location in Cloud Networking, 2011 Fourth IEEE International Conference on Utility and Cloud Computing, pp.439-444 ,
PLAG : Practical Landmark Allocation for Cloud Geolocation, IEEE 8th International Conference On, pp.1103-1106, 2015. ,
IGOD : Identification of geolocation of cloud datacenters, pp.85-102 ,
Do You Know Where Your Cloud Files Are, Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, ser. CCSW '11. ACM, pp.73-82 ,
Geolocation of Data in the Cloud, Proceedings of the Third ACM Conference on Data and Application Security and Privacy, ser. CODASPY '13. ACM, pp.25-36 ,
,
LoSt : Location Based Storage, Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop, ser. CCSW '12. ACM, pp.59-70 ,
VLOC : An Approach to Verify the Physical Location of a Virtual Machine In Cloud, Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference On, pp.86-94 ,
Constraint-Based Geolocation of Internet Hosts, vol.14, pp.1219-1232 ,
URL : https://hal.archives-ouvertes.fr/hal-01520105
Vivaldi : A Decentralized Network Coordinate System, Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, ser. SIGCOMM '04. ACM, pp.15-26 ,
Pharos : A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction, IEEE GLOBECOM 2007 -IEEE Global Telecommunications Conference, pp.421-426 ,
Phoenix : Towards an Accurate, Practical and Decentralized Network Coordinate System, NETWORKING 2009, ser. Lecture Notes in Computer Science, pp.313-325 ,
Provable Data Possession at Untrusted Stores, Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS '07. ACM, pp.598-609 ,
,
PlanetLab : An Overlay Testbed for Broadcoverage Services, vol.33, pp.3-12 ,
Detection of known and unknown DDoS attacks using Artificial Neural Networks, vol.172, pp.385-393 ,
An architecture for overlaying private clouds on public providers, 2012 8th International Conference on Network and Service Management (Cnsm) and 2012 Workshop on Systems Virtualiztion Management (Svm), pp.371-377 ,
Load-Balancing Tactics in Cloud, 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp.447-454 ,
, Internet Protocol
Towards high-capacity fibre-optic communications at the speed of light in vacuum, vol.7, pp.279-284 ,
Assessment of Regression-based Techniques for Data Location Verification at Country-Level (Invited Paper), 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM), pp.1-6 ,
,
, Amazon Web Services (AWS) -Cloud Computing Services
,
On evaluating the differences of TCP and ICMP in network measurement, vol.30, pp.428-439 ,
An Empirical Characterization of Internet Round-Trip Times, Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks, ser. Q2SWinet '17. ACM, pp.23-30 ,
, PlanetLab | An open platform for developing, deploying, and accessing planetary-scale services
, Amazon Elastic Compute Cloud (EC2)
,
The Impact of Virtualization on Network Performance of Amazon EC2 Data Center, 2010 Proceedings IEEE INFOCOM, pp.1-9 ,
Exploring the cloud from passive measurements : The Amazon AWS case, 2013 Proceedings IEEE INFOCOM, pp.230-234 ,
Opening Up Black Box Networks with CloudTalk ,
Measuring the Amazon Web Services (AWS) WAN Infrastructure ,
URL : https://hal.archives-ouvertes.fr/hal-02128052
, The Shapely User Manual -Shapely 1.7a2 documentation
Python Geospatial Analysis Essentials : Process, Analyze, and Display Geospatial Data Using Python Libraries and Related Tools, ser. Community Experience Distilled ,